Date: Fri, 18 Jan 2013 08:31:34 -0500 (EST) From: Jan Lieskovsky <jlieskov@...hat.com> To: oss-security@...ts.openwall.com Cc: "Steven M. Christey" <coley@...us.mitre.org>, Tomas Hozza <thozza@...hat.com>, Josh Stone <jistone@...hat.com> Subject: CVE Request -- dnsmasq: Incomplete fix for the CVE-2012-3411 issue Hello Kurt, Steve, vendors, the CVE-2012-3411 identifier has been originally assigned to the following issue: When dnsmasq is used in conjunctions with certain configurations of libvirtd, network packets from prohibited networks (e.g. packets that should not be passed in) may be sent to the dnsmasq application and processed. This can result in DNS amplification attacks for example.  http://www.openwall.com/lists/oss-security/2012/07/12/5 Later it was found:  https://bugzilla.redhat.com/show_bug.cgi?id=894486  https://bugzilla.redhat.com/show_bug.cgi?id=894486#c3 the upstream patch for CVE-2012-3411 it not to be working properly, as it still allowed (from ): * replies to remote TCP-protocol based DNS queries (UDP protocol ones were corrected, but TCP ones not) from prohibited networks, when the --bind-dynamic option was used, * when --except-interface lo option was used dnsmasq didn't answer local or remote UDP DNS queries, but still allowed TCP protocol based DNS queries, * when --except-interface lo option was not used local / remote TCP DNS queries were also still answered by dnsmasq. Could you allocate a new CVE identifier for this? (as an incomplete fix for CVE-2012-3411 issue) Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ